
Data Protection and Recovery in the Small and Mid-sized Business (SMB) An Outlook Report from Storage Strategies NOW By Deni Connor, Patrick H. Corrigan and James E. Bagley Intern: Emily Hernandez October 11, 2010 Storage Strategies NOW 8815 Mountain Path Circle Austin, Texas 78759 Note: The information and recommendations made by Storage Strategies NOW, Inc. are based upon public information and sources and may also include personal opinions both of Storage Strategies NOW and others, all of which we believe are accurate and reliable. As market conditions change however and not within our control, the information and recommendations are made without warranty of any kind. All product names used and mentioned herein are the trademarks of their respective owners. Storage Strategies NOW, Inc. assumes no responsibility or liability for any damages whatsoever (including incidental, consequential or otherwise), caused by your use of, or reliance upon, the information and recommendations presented herein, nor for any inadvertent errors which may appear in this document. This report is purchased by Geminare, who understands and agrees that the report is furnished solely for its internal use only and may not be furnished in whole or in part to any other person other than its directors, officers and employees, without the prior written consent of Storage Strategies NOW. Copyright 2010. All rights reserved. Storage Strategies NOW, Inc. 1 Sponsor 2 Table of Contents Sponsor ................................................................................................................................................................... 2 Introduction ............................................................................................................................................................ 5 The Small and Medium Business Market ............................................................................................................... 5 Size of Market by Revenue and IT Spending ...................................................................................................... 5 Importance of Data Protection and Business Continuity Software .................................................................... 5 SMB Unique Requirements ................................................................................................................................ 6 Growing Data Retention Demands ..................................................................................................................... 6 Technology Availability ....................................................................................................................................... 6 US SMB Businesses and Revenue by Size (SBA, 2007 data) .............................................................................. 6 The North American Industrial Classification System (NAICS) .........................................................................7 How To Reach the SMB Market .......................................................................................................................... 8 SMB Sectors Requiring Large Amounts of Data ................................................................................................. 8 Energy exploration and operations for oil and natural gas ............................................................................. 8 Mining operations other than oil and gas ....................................................................................................... 8 Motion picture and video production ............................................................................................................. 8 Data processing, hosting and related services ................................................................................................ 8 Software publishers ......................................................................................................................................... 9 The financial industry ...................................................................................................................................... 9 Legal services ................................................................................................................................................... 9 Accounting, tax preparation, bookkeeping and payroll services .................................................................... 9 Architectural, engineering and related services .............................................................................................10 Computer systems design and related services ..............................................................................................10 Research and development in physics, engineering and life sciences ...........................................................10 Healthcare ......................................................................................................................................................10 Managed Service Providers (MSPs) ................................................................................................................... 11 Data Protection Technologies ................................................................................................................................ 12 Backup to Tape ................................................................................................................................................... 12 Virtual Tape Library (VTL) ................................................................................................................................ 13 Disk-to-Disk-to-Tape (D2D2T) .......................................................................................................................... 13 Backup to Fixed Disk or Array ........................................................................................................................... 13 Backup to Removable Disk ................................................................................................................................ 13 On-Line Backup ................................................................................................................................................. 14 Online Backup Issues ..................................................................................................................................... 15 Methods for Backing up Data ............................................................................................................................ 15 3 File Synchronization .......................................................................................................................................... 16 Remote Data Replication ................................................................................................................................... 16 Images, Clones and Snapshot Images ................................................................................................................ 17 Continuous Data Protection and Near Continuous Data Protection ................................................................. 18 Agent vs. Agentless Backup ................................................................................................................................ 18 Windows Volume Shadow Copy Service (VSS) .................................................................................................. 18 Encryption and Password Protection of Backup Media .................................................................................... 19 Tape Drive-based Encryption ......................................................................................................................... 19 Encryption Issues ........................................................................................................................................... 19 Backup Data Compression ............................................................................................................................. 19 Data Deduplication ........................................................................................................................................... 20 File Mode and Block Mode ............................................................................................................................ 20 In-Line or Post-Processing Deduplication .................................................................................................... 20 Source or Target Deduplication..................................................................................................................... 20 The Downsides of Data Deduplication ........................................................................................................... 21 Application-Specific Backup .............................................................................................................................. 21 Virtual Machine (VM) Backup .......................................................................................................................... 22 Backing Up Virtual Machines ........................................................................................................................... 22 Hypervisor-specific Backup Methods ............................................................................................................... 23 Microsoft Hyper-V ................................................................................................................................
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages32 Page
-
File Size-